A Method for Encrypting Latitude and Longitude Coordinates
A longitude, latitude and longitude technology, applied in satellite radio beacon positioning systems, instruments, measuring devices, etc., can solve the problems of inability to restore longitude and latitude information, slow speed, and inability to use MD5 one-way encryption algorithm.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] As above, the same encryption method can be used to encrypt the GPS data of the second point, that is, each GPS point is encrypted using the same algorithm.
[0030] That is: from the first point, the longitude data of GPS and the string p of latitude data after encryption are, p={the longitude data after the first point GPS encryption, the latitude data after the first point GPS encryption, the second point GPS Longitude data after encryption, latitude data after GPS encryption at the second point, longitude data after GPS encryption at the third point, latitude data after GPS encryption at the third point...}.
[0031] When decrypting, the decryption algorithm matching the encryption terminal is also used to perform decryption.
Embodiment 2
[0033] Different from Embodiment 1, the second point and the GPS longitude data and latitude data of each point after the second point are encrypted in the following manner:
[0034] The longitude data and latitude data of the GPS at the second point; the longitude data of the second point is obtained by subtracting the longitude data of the first point from the longitude data of the second point, and the longitude data of the second point is obtained by subtracting the latitude data of the first point from the latitude data of the second point. Longitude data of the second point after encryption;
[0035] Encrypt the longitude data and latitude data of the third point GPS, subtract the longitude data of the second point from the longitude data of the third point to obtain the encrypted longitude data of the third point, and subtract the second point from the latitude data of the third point The longitude data of the third point after the point latitude data is encrypted;
[...
Embodiment 3
[0090] The difference from Embodiment 2 is that the mapping table is established differently. Each integer a' within the range of longitude has one and only one corresponding key value a1, and a1 is at least two characters in A-Z and a-z.
[0091] Each integer b' in the latitude range has one and only one corresponding key value b1, and b1 is at least two characters from A-Z and a-z.
[0092] The key values corresponding to the integer part of the longitude data and latitude data of the same GPS point are the same or different.
[0093] In summary, the latitude and longitude coordinate encryption method of this application adopts an end-to-end system, which solves the transmission encryption problem of GPS points; in terms of security, only two endpoints of the mapping table are owned, and will not be exposed to the network, eliminating the existence of potential safety hazards ; In terms of flexibility, since the mapping table is customized, it has higher flexibility. The k...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

